Cyber Warfare

Comments (0)

Transcript of Cyber Warfare

Cyber warfare What is Cyber warfare Purely technologicalRequires little to no physical action Disrupt communicationsSteal informationCause physical damage History 1997 Worcester, Mass- teenager disrupts air traffic communications 2000 Queensland, Australia- Man hijacks wast water-treatment system, releases raw sewage into streams and parks. 2009- Robert Gates declares cyberspace "fifth domain" of military operations Practical Use EspionageCommunication disruptionSabotage of Key infrastructure Espionage Pentagon systems are probed 250,000 times per hour Department of defense contains 15,000 networks and 7 million devices that are attacked 6 million times per day Memory sticks allow viruses to spread to classified and unclassified systems Botnets 130 billion spam messages are sent per day, Botnets are responsible for 92% Denial of service attacks- causes networks to be unable to function used by cyber vigilantes such as Anonymous Creation Malicious websitese-mailed links MPack Shadow Nordin Nasiri, 19, gained control of 150,000 computers and sold the botnet, Shadow, for 25,000 euros Stuxnet Symantec estimates dozens of US cases A number of Canadian energy companies infected Complicated virus spread by USB, made to target Iranian centrifuges Industrial targets 2007- Project Aurora 5,000 horsepower diesel engine 2009- nuclear power plant, Mariposa virus infeced 100 computers USB Viruses Control Computers Effect on Commerce Meant to be run "behind brick walls" Analyze data from sensors and send to desktopsOpen and shut water pipesRegulate natural gas flowManage chemical productionRun data centersManage power plant turbinesOperate commuter trains SHODAN "This means that these delicate [control computers] are potentially reachable from the Internet by malicious and skilled adversaries," Department of Homeland Security paper, 2010. Outdated technology Cyber attacks are causing "the greatest transfer of wealth in history" Keith Alexander, Director of Oversees U.S. Cyber Command Monetary theft Credit card numbers, financial information Intellectual theft Blueprints, research, classified information South Korea Computer systems of 3 TV stations and a number of financial institutions shut down for as long as 7 hours March13, 2013 Saudi Arabia 2012 Saudi Aramco, national oil company,data on 30,000 computer systems was destroyed "We created a new military command, to conduct a new kind of high-tech war, without public debate, media discussion, serious congressional oversight, academic analysis, or international dialogue." Richard Clarke, presidential adviser and author of Cyber War Obama's pursuit of cyber security "will not include - I repeat, will not include - monitoring private sector networks or internet traffic" Watch and Warn National Cybersecurity and Communications Integration Center (NCCIC) FBI, DOD, NSA 4 other key watch centers run by Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Department of Homeland Security Einstein II system United States Cybersecurity "We're the most vulnerable. We're the most connected. We have the most to lose." Mike McConnell, director of national intelligence 2007-2009 Pentagon Cyber command will add 13 offensive teams by fall 2015 Around the world At least 20 nations have advanced cyberwar programs Germany, Britain, Estonia and Iran More than 100 countries have some "cyberconflict prowess" Multiple nations "have the capability to conduct sustained, high-end cyberattacks against the US," Conclusion Possible: yesProbable: no "It is unlikely that there will ever be a true cyberwar." Breaks conventional conflict Virtually anyone with money and skill could do it politically motivated hacking to conduct sabotage and espionage Hackers Breaching U.S. Military Systems Attack believed to be perpetrated by Chinese hackers reveals information on 24 military systems including: F-35 Joint Strike FightersBlack Hawk HelicoptersF/A- 18 Fighter JetsAegis Ballistic Missile Defense System At this time the U.S. is poorly equiped to deal with cyber conflict All out Cyber war? U.S. Readyness